• Title/Summary/Keyword: Operation software

Search Result 1,781, Processing Time 0.03 seconds

Development of an operation and control software for electro-hydraulic (전자유압식 CVT의 운용 및 제어 소프트웨어 개발과 실시간 제어)

  • Kwan, H. B.;Kim, K. W.;Kim, H. S.;Eun, T.;Park, C. I
    • Journal of the korean Society of Automotive Engineers
    • /
    • v.15 no.3
    • /
    • pp.36-46
    • /
    • 1993
  • In CVT vehicle, the engine speed is completely decoupled from the vehicle speed within the range from maximum transmission ratio to minimum transmission ratio. This allows the engine to operate in optimal state(e.g. best fuel economy or maximum power mode.) In this study, the CVT control algorithm for optimal operation of engine is suggested. In order to implement the real time digital control of electro-hydraulic CVT system, a software called CVTCON has been developed. CVTCON also includes the CVT operation module, (2) system test module, (3) system control module and (4) data management module. By using the CVTCON and the electro-hydraulic CVT system, two modes of experiments were carried out: constant throttle opening mode and acceleration mode. From the experimental result, it was found that the algorithm suggested in this study showed optimal operation of the CVT system.

  • PDF

Improving Flexibility of External Data Exchange in Count-fire Operation System by Adapting Dynamic Parser Software (동적 구문처리기 소프트웨어 적용을 통한 대화력전 수행체계 연동의 유연성 향상 방안)

  • Hong, Won-Eui
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.51-56
    • /
    • 2008
  • The counter-fire operation system performs its mission exchanging information with other related systems such as command & control systems and military information systems. In the process of exchanging information, the counter-fire operation system uses a type of data message which contains exchange data information in the format of KMTF. The requirement of data exchange of count-fire operation will continue to evolve. But the EDX(External Data eXchange) configuration item of the current counter-fire operation system can not effectively cope with the variation of data exchange requirements due to its fixed software structure. In the paper, a solution for improving flexibility of external data exchange in counter-fire operation system is proposed.

A Development on the software of Train Control and Monitoring System(TCMS) for Subway Train (전동차용 종합제어장치 소프트웨어 개발)

  • Choi, Byoung-Wook;Park, Jong-Hun
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.25 no.12
    • /
    • pp.94-100
    • /
    • 2011
  • TCMS is the most important controller in the subway train for reliable train control and service oriented flexibility. TCMS software charges communications and control of train and maintains control devices so we use QNX for real-time control. This paper introduces overall software development of TCMS using various diagrams. Software implementation details in TC and CC are explained using deployment diagram through train configuration. Driving control process among many processes is focused to present implement details which controls train by driver or automatic train operation and handles commands to control deriving devices in cars. Reliable operation of train and easy maintenance process is achieved through the same hardware in train control computer and car control computer.

Prediction of Safety Critical Software Operational Reliability from Test Reliability Using Testing Environment Factors

  • Jung, Hoan-Sung;Seong, Poong-Hyun
    • Nuclear Engineering and Technology
    • /
    • v.31 no.1
    • /
    • pp.49-57
    • /
    • 1999
  • It has been a critical issue to predict the safety critical software reliability in nuclear engineering area. For many years, many researches have focused on the quantification of software reliability and there have been many models developed to quantify software reliability. Most software reliability models estimate the reliability with the failure data collected during the test assuming that the test environments well represent the operation profile. User's interest is however on the operational reliability rather than on the test reliability. The experiences show that the operational reliability is higher than the test reliability. With the assumption that the difference in reliability results from the change of environment, from testing to operation, testing environment factors comprising the aging factor and the coverage factor are developed in this paper and used to predict the ultimate operational reliability with the failure data in testing phase. It is by incorporating test environments applied beyond the operational profile into testing environment factors. The application results show that the proposed method can estimate the operational reliability accurately.

  • PDF

Block-type Program for Drone Operation for Software Training (소프트웨어 교육을 위한 드론조작용 블록형 프로그램)

  • Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.4
    • /
    • pp.875-880
    • /
    • 2018
  • After the Fourth Industrial Revolution, there has been a software revolution around the world in which software is combined with industry and society to create new value. In order to prepare this, developed countries provide software education that includes basic principles of computer science and coding instead of computer application education. This paper proposes a block program using a drone. Throughout this research, various education for creativity thinking and problem solving ability is possible in connection with the creativity and convergence education.

Design, Implementation, and Validation of KOMPSAT-2 Software Simulator

  • Lee, Sang-Uk;Lee, Byoung-Sun;Kim, Jae-Hoon;Cho, Sung-Ki
    • ETRI Journal
    • /
    • v.27 no.2
    • /
    • pp.140-152
    • /
    • 2005
  • In this paper, we present design features, implementation, and validation of a satellite simulator subsystem for the Korea Multi-Purpose Satellite-2 (KOMPSAT-2). The satellite simulator subsystem is implemented on a personal computer to minimize costs and trouble on embedding onboard flight software into the simulator. An object-oriented design methodology is employed to maximize software reusability. Also, instead of a high-cost commercial database, XML is used for the manipulation of spacecraft characteristics data, telecommand, telemetry, and simulation data. The KOMPSAT-2 satellite simulator subsystem is validated by various simulations for autonomous onboard launch and early orbit phase operations, anomaly operation, and science fine mode operation. It is also officially verified by successfully passing various tests such as the satellite simulator subsystem test, mission control element system integration test, interface test, site installation test, and acceptance test.

  • PDF

An Empirical Study on Contract Model for IT Outsourcing Application Operation (IT 아웃소싱 어플리케이션 운영 계약모델에 대한 실증적 연구)

  • Kim, Heungshik;Park, Soah
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.45-60
    • /
    • 2017
  • The study suggests a contract model of application operation through case study of A bank's IT outsourcing application contract based on workload. The IT outsourcing order form has a problem in that the scope of work is ambiguous due to the integration of operation and maintenance. In this study, application operation and maintenance were separated by referring to application operation history provided in ISO/IEC15504-5 standard. The scope of the IT outsourcing service was clarified by organizing the definition and detail activities of the application operation business. Application operation contract method has generally applied estimation method by the number of input manpower and period by agreement between buyer and client. As there is no activity to calculate the number of input manpower based on the operational work history and based on the standard workload per activity. In this case is not guaranteed due to the simple agreement between the contractors. In this paper, we propose an application operating cost estimation model that measures the size of the operating software using function point analysis that is the basis of application operation tasks. In order to verify the validity of the application operation cost model, we verified the correlation between the application size and the labor cost through regression analysis using SPSS.

Development and Optimal Operation of an Electro-Hydraulic Controlled Rig Type CVT (전자유압제어식 리그형 CVT 개발과 최적운전)

  • Kim, K.W.;Kwon, H.B.;Kim, H.S.;Eun, T.;Park, C.I.
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.17 no.9
    • /
    • pp.2181-2190
    • /
    • 1993
  • An electro-hydraulic controlled rig type CVT(Continuously Variable Transmission) system was developed and its performance tests were carried out for the optimal operation. A CVT map was suggested based on the speed ration-axial force-torque relationship which was derived from the metal belt CVT mechanics. Also, a real time control and operation software was developed for the electro-hydraulic CVT system. By using the software and the CVT map, the control system was designed for the CVT speed ratio control with various drive modes. The electro-hydraulic CVT system developed in this study showed that the optimal operation algorithm could be obtained for the best fuel economy or the maximum power mode.

A Design of Inter-Working System between Secure Coding Tools and Web Shell Detection Tools for Secure Web Server Environments (안전한 웹 서버 환경을 위한 시큐어코딩 도구, 웹쉘 탐지도구 간의 상호연동 시스템 설계)

  • Kim, Bumryong;Choi, Keunchang;Kim, Joonho;Suk, Sangkee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.81-87
    • /
    • 2015
  • Recently, with the development of the ICT environment, the use of the software is growing rapidly. And the number of the web server software used with a variety of users is also growing. However, There are also various damage cases increased due to a software security vulnerability as software usage is increasing. Especially web shell hacking which abuses software vulnerabilities accounts for a very high percentage. These web server environment damage can induce primary damage such like homepage modification for malware spreading and secondary damage such like privacy. Source code weaknesses checking system is needed during software development stage and operation stage in real-time to prevent software vulnerabilities. Also the system which can detect and determine web shell from checked code in real time is needed. Therefore, in this paper, we propose the system improving security for web server by detecting web shell attacks which are invisible to existing detection method such as Firewall, IDS/IPS, Web Firewall, Anti-Virus, etc. while satisfying existing secure coding guidelines from development stage to operation stage.

Implementation of Software Radio System for IEEE 802.15.4 Physical Layer Using USRP and GNU Radio (USRP와 GNU Radio를 이용한 IEEE 802.15.4 물리 계층 소프트웨어 라디오 시스템 구현)

  • Park, Dae-Hyeon;Kim, Young-Sik
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.11
    • /
    • pp.1214-1219
    • /
    • 2010
  • In this paper, a software radio system, supporting the physical layer of IEEE 802.15.4 standard, has been developed using USRP(Universal Software Radio Peripheral) board and GNU Radio package of an open source development kit for software radio. The software radio system supports the standards of BPSK and OQPSK modulations for 868/915 MHz band and OQPSK modulation for 2.45 GHz band. To verify the operation of the developed system, it has been tested under the standard signals according to the frequency band and packet structures for the transmitting and receiving operation. At 2.4 GHz, the Smart RF EV board and CC2430 modules are used to check the proper operation of the software radio system. The system performance test shows that the emission power spectrum, the eye-pattern, and PER(Packet Error Rate) meet the standard. It has been confirmed that the developed system supports the PHY layer of IEEE 802.15.4.